Review Questions
Answer the following questions, and then refer to Appendix A, "Answers to Review Questions," for the answers.
-
Which descriptions best define the core layer? (Choose two.)
- It aggregates end users and supports a feature-rich environment.
- It provides a high-speed, Layer 3 switching environment using hardware-accelerated services.
- It performs high-speed routing and packet manipulations.
- It provides scalability and fast policy-based connectivity.
- It provides the backbone for campus connectivity.
-
What hardware supports Cisco IOS Software modularity? (Choose all that apply.)
- Cisco Catalyst 3750 series
- Cisco Catalyst 4500 series
- Cisco Catalyst 6500 series
- Cisco Catalyst XR series
- All Cisco Catalyst series switches
-
Which statements are correct descriptions of NSF?
- It allows the standby RP to takes control of the device after a hardware or software fault on the active RP.
- It is a Layer 3 function that works with SSO to minimize the amount of time a network is unavailable to its users following a switchover.
- It is supported by the Cisco implementation of EIGRP, OSPF, RIP, and BGP protocols.
- It synchronizes startup configuration, startup variables, and running configuration.
- The main objective of NSF is to continue forwarding IP packets following an RP switchover.
-
If you need to implement STP, which version is recommended for the enterprise campus?
- CST
- HSRP
- MST
- PVST+
- RSTP
-
What is the enterprise recommendation regarding UDLD?
- Adjust the default hello timers to three seconds for aggressive mode.
- Enable it to create channels containing up to eight parallel links between switches.
- Enable it in global mode and on every interface you need to support.
- Enable it in global mode to support every individual fiber-optic and Ethernet interface.
- Enable it in global mode to support every individual fiber-optic interface.
-
Which statements are correct descriptions of EtherChannels? (Choose two.)
- EtherChannels can reduce the number of peers by creating a single logical interface.
- EtherChannels can increase the number of peers by creating multiple logical interfaces.
- OSPF running on a Cisco IOS Software–based switch will not notice a failed link in a bundle.
- EIGRP may not change the link cost if there is a failed link in a bundle.
- EtherChannel Min-Links feature is supported on PAgP EtherChannels.
-
Which statements are correct descriptions of EtherChannel load balancing? (Choose three.)
- Load balancing using an alternate input hash can be tuned with the cef port-channel load-balance command.
- Load balancing using an alternate input hash can be tuned with the port-channel load-balance command.
- The default input hash value of Layer 3 for the source and destination does not load balance across the links.
- The default input hash value of Layer 3 for source and destination and Layer 4 port does load balance across the links.
- To achieve the best load balancing, use alternating hashes in the core and distribution layer switches.
- To achieve the best load balancing, use two, four, or eight ports in the port channel.
-
What are the reasons that passive interfaces should be implemented at distribution layer ports facing the access layer? (Choose two.)
- To limit unnecessary peering across the access layer switches when the Layer 2 to Layer 3 boundary is in the distribution layer
- To limit unnecessary peering across the access layer switches when the Layer 2 to Layer 3 boundary is in the access layer
- To provide high availability in the event of a link or node failure
- To support transit traffic through the access layer in the event of a link or node failure
- To avoid transit traffic through the access layer in the event of a link or node failure
-
What are the advantages of GLBP in the distribution layer? (Choose two.)
- GLBP provides all the benefits of HSRP and includes load balancing when VLANs do not span the access switches.
- A convergence event on the uplink affects only half as many hosts as compared to HSRP when VLANs do not span the access switches.
- A convergence event on the uplink affects is processed in half the time as compared to HSRP when VLANs do not span the access switches.
- STP can block one of the access layer uplinks, and there is at most a two-hop Layer 2 path for upstream traffic when VLANs span access switches.
- STP can block one of the access layer uplinks, and there is at most a two-hop Layer 3 path for upstream traffic when VLANs span access switches.
-
What is a potential issue when daisy chaining access layer switches?
- It is not easy to determine where the root switch is located.
- It is very hard to determine how many ports will be in a blocking state.
- The design will black-hole traffic and be affected by multiple convergence events with a single network failure.
- There is a danger that black holes will occur in the event of a link or node failure when the distribution interconnection is Layer 2.
- There is a danger that black holes will occur in the event of a link or node failure when the distribution interconnection is Layer 3.
-
What is the best mechanism to prevent unicast flooding issues?
- Bias the routing metrics to remove equal-cost routes.
- Do not span VLANs across multiple access switches.
- Span VLANs across multiple access switches.
- Tune ARP timers so they exceed CAM timers.
- Tune CAM timers so they exceed ARP timers.
-
What hardware is supported by the Cisco Power Calculator? (Choose all that apply.)
- Cisco Catalyst 3750 series
- Cisco Catalyst 4500 series
- Cisco Catalyst 6500 series
- Cisco Catalyst XR series
- All Cisco Catalyst series switches
-
What features do Cisco Catalyst Integrated Security capabilities provide? (Choose three.)
- DHCP snooping prevents client attacks on the DHCP server and switch.
- Dynamic ARP Inspection adds security to ARP to minimize the impact of ARP poisoning and spoofing attacks.
- DHCP snooping prevents client attacks on the DHCP server and switch using the Dynamic ARP Inspection table.
- IP Source Guard prevents IP spoofing using the DHCP snooping table.
- IP Source Guard prevents IP spoofing using the Dynamic ARP Inspection table.